CIS OVAL Repository0.15.11.22018-12-19T08:24:06Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Digital Signature Verification Bypass VulnerabilityCisco IOS-XEA vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an authenticated, local attacker to install a malicious software image or file on an affected device. The vulnerability is due to the affected software improperly verifying digital signatures for software images and files that are uploaded to a device. An attacker could exploit this vulnerability by uploading a malicious software image or file to an affected device. A successful exploit could allow the attacker to bypass digital signature verification checks for software images and files and install a malicious software image or file on the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Standard and Special Network Time Protocol Query Program Infinite loopCisco IOS-XEA vulnerability in the standard and special Network Time Protocol query program (ntpq and ntpdc) could allow an unauthenticated, remote attacker to cause the ntpq or ntpdc program to remain in a processing loop. The vulnerability is due to a loop that is not exited under certain conditions in the ntpq and ntpdc processes. An attacker could exploit this vulnerability by sending malicious packets to an ntpq or ntpdc client from a malicious NTP server or from a privileged network position by conducting a man-in-the-middle attack between a targeted client and the NTP server. An exploit could allow the attacker to cause the ntpq or ntpdc process to enter an infinite loop, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cluster Management Protocol Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: The failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device, and The incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Ethernet Virtual Private Network Border Gateway Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) ["https://tools.ietf.org/html/rfc7432"] draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The Cisco implementation of the BGP protocol only accepts incoming BGP traffic from explicitly defined peers. To exploit this vulnerability, an attacker must be able to send the malicious packets over a TCP connection that appears to come from a trusted BGP peer, or inject malformed messages into the victim's BGP network. This would require obtaining information about the BGP peers in the affected system's trusted network. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. At least one BGP neighbor session must be established for a router to be vulnerable.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Standard Network Time Protocol Query Program saveconfig Command Allows Dangerous Characters in FilenamesCisco IOS-XEAn issue in the standard Network Time Protocol query program (ntpq) could allow an authenticated, remote attacker to create files on the system with dangerous characters in the filename. The issue is due to to improper validation of characters within filenames. An attacker could exploit this issue by saving a filename with the saveconfig command. An exploit could allow the attacker to write filenames to the system that may contain potentially dangerous character sequences.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Fragmentation Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange version 1 (IKEv1) fragmentation code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an exhaustion of available memory or a reload of the affected system. The vulnerability is due to the improper handling of crafted, fragmented IKEv1 packets. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow the attacker to cause a reload of the affected system. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11NTP Authentication bypass vulnerabilityCisco IOS-XEA vulnerability in the message authentication code (MAC) validation routine of ntpd could allow an unauthenticated, remote attacker to bypass the NTP authentication feature. The vulnerability is due to incorrect validation of the MAC field. An attacker could exploit this vulnerability by sending unauthenticated NTP packets to an NTP host that is configured with symmetric key authentication. An exploit could allow the attacker to inject NTP packets to the NTP host without knowledge of the NTP symmetric key.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Cisco Umbrella Integration Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Cisco Umbrella Integration feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a logic error that exists when handling a malformed incoming packet, leading to access to an internal data structure after it has been freed. An attacker could exploit this vulnerability by sending crafted, malformed IP packets to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software IKEv2 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IKEv2 module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service condition. The vulnerability is due to improper processing of malformed fields submitted as part of an IKE version 2 packet. An attacker could exploit this vulnerability by submitting malformed IKE packets to an affected device designed to trigger the issue. An exploit could allow the attacker to cause a denial of service condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Fragmented Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the code handling the reassembly of fragmented IP version 4 (IPv4) or IP version 6 (IPv6) packets of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause a crash of the Embedded Services Processor (ESP) processing the packet. The vulnerability is due to improper processing of crafted, fragmented packets. An attacker could exploit this vulnerability by sending a crafted sequence of fragmented packets. An exploit could allow the attacker to cause a reload of the affected platform.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11OSPF LSA Manipulation Vulnerability in Multiple Cisco ProductsCisco IOS-XEMultiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated attacker to take full control of the OSPF Autonomous System (AS) domain routing table, blackhole traffic, and intercept traffic. The attacker could trigger this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause flushing of the routing table on a targeted router, as well as propagation of the crafted OSPF LSA type 1 update throughout the OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability can only be triggered by sending crafted unicast or multicast LSA type 1 packets. No other LSA type packets can trigger this vulnerability. OSPFv3 is not affected by this vulnerability. Fabric Shortest Path First (FSPF) protocol is not affected by this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software SIP Traffic Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a DoS condition. The vulnerability is due to improper handling of SIP packets by Cisco 1000 Series ASR when configured for VRF-aware NAT and SIP ALG. An attacker could exploit this vulnerability by sending a large number of SIP packets traversing a device configured for NAT; this vulnerability cannot be triggered by SIP traffic destined to a vulnerable device. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco cBR-8 Series Converged Broadband Router SNMP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software running on Cisco cBR-8 Series Converged Broadband Routers could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability exists because the affected platform does not properly trap SNMP read requests for a specific object ID that is not supported by the platform. When such a request is processed, the SNMP process may attempt to reference a pointer with a NULL value. To exploit this vulnerability, an attacker who can authenticate to an affected device may submit a specific, valid SNMP request. A successful exploit will cause the supervisor card that serviced the request to restart, due to an attempt to access an invalid memory region, and result in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Autonomic Networking Infrastructure Certificate Validation VulnerabilityCisco IOS-XEA vulnerability in certificate validation for Autonomic Networking Infrastructure (ANI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to masquerade as another device. The vulnerability is due to incomplete certificate validation. An attacker could exploit this vulnerability by sending crafted messages to the ANI device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Information Disclosure of Origin TimestampCisco IOS-XEA vulnerability in the standard and the special Network Time Protocol query program (ntpq and ntpdc) could allow an unauthenticated, remote attacker to obtain the value of the origin timestamp expected in the next peer response. The vulnerability is due to ntpq and ntpdc providing this information without requiring authentication. An attacker could exploit this issue by querying the client with the appropriate ntpq or ntpdc commands. An exploit could allow the attacker to obtain the next peer response origin timestamp, which could be leveraged in further attacks.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Fragment Reassembly Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPv4 fragment reassembly function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to the corruption of an internal data structure that occurs when the affected software reassembles an IPv4 packet. An attacker could exploit this vulnerability by sending crafted IPv4 fragments to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Internet Key Exchange Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software HTTP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the web framework of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to the affected software improperly parsing malformed HTTP packets that are destined to a device. An attacker could exploit this vulnerability by sending a malformed HTTP packet to an affected device for processing. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected device, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE Software TCP Segment Reassembly Denial of Service VulnerabilityCisco IOS-XEA vulnerability in TCP segment reassembly of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of large TCP reassembled packets that are being processed by NAT and ALG features on the affected device. An attacker could exploit this vulnerability by sending a TCP packet that is large after the reassembly to traverse a vulnerable device. Only packets being handled by NAT and ALG features have a potential to cause an affected device to reload. An exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software UDP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the UDP processing code of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Web UI REST API Authentication Bypass VulnerabilityCisco IOS-XEA vulnerability in the REST API of the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication to the REST API of the web UI of the affected software. The vulnerability is due to insufficient input validation for the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious API request to an affected device. A successful exploit could allow the attacker to bypass authentication and gain access to the web UI of the affected software.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software H.323 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the H.323 subsystem of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition on an affected device. The vulnerability is due to a failure to properly validate certain fields in an H.323 protocol suite message. When processing the malicious message, the affected device may attempt to access an invalid memory region, resulting in a crash. An attacker who can submit an H.323 packet designed to trigger the vulnerability could cause the affected device to crash and restart.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Simple Network Management Protocol Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device. The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Replay Attack on Authenticated Broadcast Mode VulnerabilityCisco IOS-XEA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, adjacent attacker to replay broadcast server packets. The vulnerability is due to no replay protection on NTP broadcast packets. An attacker could exploit this vulnerability by capturing and retransmiting NTP broadcast packets to a targeted system. An exploit could allow the attacker to cause time settings on a targeted system to stop updating and maintain a particular time value.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Directory Traversal VulnerabilityCisco IOS-XEA vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system. The vulnerability is due to insufficient validation of files submitted to the affected installation utility. An attacker could exploit this vulnerability by uploading a crafted file to an affected system and running the installation utility command. A successful exploit could allow the attacker to gain write access to some files in the underlying operating system, which could allow the attacker to override the write-accessible files and compromise the integrity of the system. To exploit this vulnerability, the attacker must have sufficient privileges to execute the appropriate commands. In a default configuration, the privilege 15 privilege is needed to exploit this vulnerability. As a secondary impact of this vulnerability, an attacker may be able to modify some files and obtain access to the underlying operating system shell without having to provide a valid license.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Crafted MPLS IP Fragmentation Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Multiprotocol Label Switching (MPLS) IP fragmentation function of Cisco IOS XE could allow an unauthenticated, remote attacker to cause the Cisco Packet Processor to crash. The vulnerability is due to input validation processing of the crafted MPLS IP packets. An attacker could exploit this vulnerability by injecting specifically crafted MPLS IP packets that are subject to MPLS fragmentation. An exploit could allow the attacker to cause the Cisco Packet Processor process to crash in Cisco IOS XE software.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Daemon reslist NULL Pointer Deference Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the list_restrict4() and list_restrict6() routines of the Network Time Protocol daemon (ntpd) could allow an authenticated, remote attacker to cause the ntpd to crash. The vulnerability is due to a null pointer dereference in the list_restrict4() and list_restrict6() routines. An attacker could exploit this vulnerability by performing an ntpdc reslist command against a device that has a large number of NTP restrictions in place. An exploit could allow the attacker to cause the ntpd to crash.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the implementation of the cluster feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation when handling Cluster Management Protocol (CMP) messages. An attacker could exploit this vulnerability by sending a malicious CMP message to an affected device. A successful exploit could allow the attacker to cause the switch to crash and reload or to hang, resulting in a DoS condition. If the switch hangs it will not reboot automatically, and it will need to be power cycled manually to recover.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco cBR Series Converged Broadband Routers List Headers Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the handling of list headers in Cisco cBR Series Converged Broadband Routers could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to memory corruption. An attacker could exploit this vulnerability by sending crafted PacketCable Multimedia (PCMM) packets to an affected device. An exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS-XE SSHv2 RSA-Based User Authentication By-Pass VulnerabilityCisco IOS-XEA vulnerability in the SSH version 2 (SSHv2) implementation of the public key authentication method of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to bypass user authentication. The vulnerability is due to a flaw in the implementation of the SSHv2 public key authentication method, also known as Rivest, Shamir, and Adleman (RSA)-based user authentication. An attacker could exploit this vulnerability by authenticating to an affected system configured for SSHv2 RSA-based user authentication using a crafted private key. The attacker must know a valid username configured for RSA-based user authentication and the public key configured for that user to exploit this vulnerability. A successful exploit could allow the attacker to bypass user authentication and log in with the privileges of the user or with the privileges configured for the virtual teletype (VTY) line. Depending on the configuration of the user and of the VTY line, the attacker may obtain administrative privileges on the system. The attacker cannot use this vulnerability to elevate privileges.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Simple Network Management Protocol Double-Free Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper management of memory resources, referred to as a double free. An attacker could exploit this vulnerability by sending crafted SNMP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. To exploit this vulnerability via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for an affected system. To exploit this vulnerability via SNMP Version 3, the attacker must know the user credentials for the affected system.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software TFTP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the flow manager code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause flow manager to hold UDP sessions in its table. The vulnerability is due to not releasing memory for flows generated by TFTP UDP traffic. An attacker could exploit this vulnerability by either starting a local TFTP transaction from the device, or by requesting a TFTP file operation when the device is configured as a TFTP server. An exploit could allow the attacker to have the Cisco IOS XE software hold the flow manager sessions in a table, decreasing memory and eventually resulting in system instability or a potential system crash.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Crafted NTP Packets Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the processing of Network Time Protocol (NTP) packets by Cisco IOS and Cisco IOS XE could allow an unauthenticated, remote attacker to cause an interface wedge and an eventual denial of service (DoS) condition on the affected device. The vulnerability is due to insufficient checks on clearing the invalid NTP packets from the interface queue. An attacker could exploit this vulnerability by sending a number of crafted NTP packets to be processed by an affected device. An exploit could allow the attacker to cause an interface wedge and an eventual denial of service (DoS) condition on the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software EnergyWise Denial of Service VulnerabilitiesCisco IOS-XEMultiple vulnerabilities in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software IPv6 Snooping Secure Network Discovery Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPv6 snooping feature from the first-hop security features in Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient Control Plane Protection (CPPr) against specific IPv6 ND packets. An attacker could exploit this vulnerability by sending a flood of traffic consisting of specific IPv6 ND packets to an affected device where the IPv6 snooping feature is configured.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software mDNS Gateway Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the multicast DNS (mDNS) gateway function of Cisco IOS Software could allow an unauthenticated, remote attacker to reload the vulnerable device. The vulnerability is due to improper validation of mDNS packets. An attacker could exploit this vulnerability by sending malformed IPv4 or IPv6 packets on UDP port 5353. An exploit could allow the attacker to cause a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Privileged EXEC Mode Root Shell Access VulnerabilityCisco IOS-XEA vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerability is due to the affected software improperly sanitizing command arguments to prevent modifications to the underlying Linux filesystem on a device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit this vulnerability on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Registrar Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: Running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature Configured as an autonomic registrar Has a whitelist configured An exploit could allow the attacker to cause the affected device to reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software Internet Key Exchange Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange (IKE) protocol of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak that could lead to a device reload. The vulnerability is due to incorrect handling of malformed IKE packets by the affected software. An attacker could exploit this vulnerability by sending crafted IKE packets to a device configured with features that leverage IKE version 1 (IKEv1). Although IKEv1 is automatically enabled on a Cisco IOS Software and Cisco IOS XE Software when IKEv1 or IKE version 2 (IKEv2) is configured, the vulnerability can be triggered only by sending a malformed IKEv1 packet. In specific conditions, normal IKEv1 packets can also cause an affected release of Cisco IOS Software to leak memory. Only IKEv1 is affected by this vulnerability. An exploit could cause Cisco IOS Software not to release allocated memory, causing a memory leak. A sustained attack may result in a device reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE and Cisco Unified Communications Manager Software Session Initiation Protocol Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the Session Initiation Protocol (SIP) gateway implementation in Cisco IOS, IOS XE, and Cisco Unified Communications Manager Software could allow an unauthenticated, remote attacker to cause a memory leak and eventual reload of an affected device. The vulnerability is due to improper processing of malformed SIP messages. An attacker could exploit this vulnerability by sending malformed SIP messages to be processed by an affected device. An exploit could allow the attacker to cause a memory leak and eventual reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and Cisco IOS XE Software IPv6 crafted Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPv6 processing code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of specific IPv6 hop-by-hop options. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to or through the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11OpenSSL X509_ATTRIBUTE Memory Leak VulnerabilityCisco IOS-XEA vulnerability in OpenSSL could allow an unauthenticated, remote attacker to cause a DoS condition. The vulnerability is due to improper memory handling. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to an application that uses the OpenSSL library. Successful exploitation could allow the attacker to cause the application to consume available memory resources, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Cisco Discovery Protocol Packet Processing Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Cisco Catalyst 4500 Series Switches running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper processing of valid crafted Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol packets to be processed by an affected device. An exploit could allow the attacker to cause the software to stop functioning properly, resulting in a DoS condition on the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Metadata DoS Vulnerability (CSCue22753)Cisco IOS-XEA vulnerability exists in the metadata function of Cisco IOS Software that could allow an unauthenticated, remote attacker to reload the vulnerable device. The vulnerability is due to improper handling of transit RSVP packets that need to be processed by the metadata infrastructure. An attacker could exploit this vulnerability by sending malformed RSVP packets. An exploit could allow the attacker to cause an extended DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco ASR1000 Series Routers Incomplete or Glean Adjacencies Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Cisco ASR 1000 Series software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper processing of route adjacencies. An attacker could exploit this vulnerability by sending malicious IP packets to an affected device. A successful exploit could allow the attacker to cause the device to stop responding.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11OpenSSL RSA Temporary Key Cryptographic Downgrade VulnerabilityCisco IOS-XEA vulnerability in OpenSSL could allow an unauthenticated, remote attacker to bypass security restrictions. The vulnerability is due to improper handling of an RSA temporary key. An attacker with a privileged network position could exploit the vulnerability by returning a weak temporary RSA key to a system using an application that uses the vulnerable OpenSSL library. When processed, the insecure temporary key could result in reduced cryptographic protections, which could allow the attacker to bypass security protections.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software OSPF Opaque LSA Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the OSPF implementation of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. The vulnerability is due to improper parsing of certain options in OSPF link-state advertisement (LSA) type 11 packets. An attacker could exploit this vulnerability by sending LSA type 11 OSPF packets with unusual options set. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Multicast Source Discovery Protocol PIM Message Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Multicast Source Discovery Protocol (MSDP) subsystem of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition. The vulnerability is due to a failure to properly parse an MSDP-encapsulated Protocol Independent Multicast (PIM) message that contains unexpected values. An attacker could exploit the vulnerability by forwarding a malformed PIM packet to an MSDP rendezvous point (RP) that has an affected MSDP peer. A successful exploit could allow the attacker to cause the affected device to restart.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE AAA DHCP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in a DHCP function that assigns IP addresses to AAA clients on Cisco IOS XE Software could allow an authenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper processing of AAA packets that require IP address assignment from a DHCP pool. An attacker could exploit this vulnerability by sending AAA packets to a device configured to authenticate and assign an address from a DHCP pool. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software IP Service Level Agreement VulnerabilityCisco IOS-XEA vulnerability exists in the implementation of the IP Service Level Agreement responder feature of Cisco IOS Software that could allow an unauthenticated, remote attacker to cause a reload of the vulnerable device. The vulnerability is due to improper validation of IP SLA packets on UDP port 1167. An attacker could exploit this vulnerability by sending malformed IP SLA packets addressed to the affected device. An exploit could allow the attacker to cause an extended DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Smart Install Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Web User Interface Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient resource handling by the affected software when the web user interface is under a high load. An attacker could exploit this vulnerability by sending a high number of requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software EnergyWise Denial of Service VulnerabilitiesCisco IOS-XEMultiple vulnerabilities in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Autonomic Networking Registration Authority Spoofing VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and IOS XE Software could allow an unauthenticated, remote attacker to spoof an Autonomic Networking Registration Authority (ANRA) response. The vulnerability is due to insufficient validation of an Autonomic Networking (AN) response message. An attacker could exploit this vulnerability by sending crafted AN messages. A successful exploit could allow an attacker to bootstrap a device into an untrusted autonomic domain, gaining limited command and control of the AN node, causing a denial of service (DoS) condition and disrupting access to the legitimate autonomic domain.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Layer 2 Tunneling Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Layer 2 Tunneling Protocol (L2TP) parsing function of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of L2TP packets. An attacker could exploit this vulnerability by sending a crafted L2TP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Malformed L2TP Packet VulnerabilityCisco IOS-XEA vulnerability in the Layer 2 Tunneling Protocol (L2TP) module of Cisco IOS XE on Cisco ASR 1000 Series Routers could allow an authenticated, remote attacker to cause a reload of the processing ESP card. The vulnerability occurs during the processing of a malformed L2TP packet. An attacker could exploit this vulnerability by sending malformed L2TP packets over an established L2TP session. An exploit could allow the attacker to cause a reload of the affected ESP card.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software for Cisco ASR 920 Series Routers Zero Touch Provisioning Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP code for the Zero Touch Provisioning feature of Cisco ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a format string vulnerability when processing a crafted DHCP packet for Zero Touch Provisioning. An attacker could exploit this vulnerability by sending a specially crafted DHCP packet to an affected device. An exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software for Cisco 5760 WLC, Cisco Catalyst 4500E Supervisor Engine 8-E, and Cisco NGWC 3850 GUI Privilege Escalation VulnerabilityCisco IOS-XEA vulnerability in the web-based Wireless Controller GUI of Cisco IOS XE Software for Cisco 5760 Wireless LAN Controllers, Cisco Catalyst 4500E Supervisor Engine 8-E (Wireless) Switches, and Cisco New Generation Wireless Controllers (NGWC) 3850 could allow an authenticated, remote attacker to elevate their privileges on an affected device. The vulnerability is due to incomplete input validation of HTTP requests by the affected GUI, if the GUI connection state or protocol changes. An attacker could exploit this vulnerability by authenticating to the Wireless Controller GUI as a Lobby Administrator user of an affected device and subsequently changing the state or protocol for their connection to the GUI. A successful exploit could allow the attacker to elevate their privilege level to administrator and gain full control of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Zero Origin Timestamp BypassCisco IOS-XEA vulnerability in the Network Time Protocol daemon (ntpd) could allow an unauthenticated, remote attacker to modify time settings on a targeted system. The vulnerability is due to incorrect processing of NTP update packets. An attacker could exploit this vulnerability by sending crafted updates that contain an a zero-origin timestamp to the clients' peer server. An exploit could allow the attacker to modify the time values received by the client, preventing client systems from receiving further updates from its legitimately configured time server.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Challenge/Response Bypass VulnerabilityCisco IOS-XEA vulnerability in the request system shell command supported by specific Cisco IOS XE platforms (WS-C3850, WS-C3650, AIR-CT5760, and WS-C4500X) could allow an authenticated, local attacker with administrative privilege (15) to access the underlying Linux root shell. The vulnerability is due to improper parsing of the challenge response. An attacker could exploit this vulnerability by entering a crafted challenge response. An exploit could allow the attacker to compromise the system. The request system shell command is available only if the service internal command is configured, which is not recommended.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Packet Processing Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software Release 16.1.1 contains a vulnerability that could allow an unauthenticated, adjacent attacker to cause an affected device to reload. The vulnerability is due to incorrect processing of packets that have a source MAC address of 0000:0000:0000. An attacker could exploit this vulnerability by sending a frame that has a source MAC address of all zeros to an affected device. A successful exploit could allow the attacker to cause the device to reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software and Cisco IOS XE Software Crafted IPv6 Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the implementation of the IPv6 protocol stack in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause I/O memory depletion on the affected device. The vulnerability is due to incorrect processing of crafted IPv6 packets. An attacker could exploit this vulnerability by sending specially crafted IPv6 packets to the affected device. An exploit could allow the attacker to trigger I/O memory depletion, causing device instability and could cause a device to reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Simple Network Management Protocol Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device. The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system. Only traffic directed to the affected system can be used to exploit this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software Multicast NTP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the implementation of the Network Time Protocol (NTP) feature in Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of multicast NTP packets that are sent to an affected device encapsulated in a Multicast Source Discovery Protocol (MSDP) Source-Active (SA) message from a configured MSDP peer. An attacker could exploit this vulnerability by sending multicast NTP packets to an affected device. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Zone-Based Firewall Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Zone-Based Firewall code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a device to reload. The vulnerability is due to the way fragmented packets are handled in the firewall code. An attacker could exploit this vulnerability by sending fragmented IP Version 4 or IP Version 6 packets through an affected device. An exploit could allow the attacker to cause the device to crash, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software MVPNv6 Traffic Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software contains a vulnerability that could allow an unauthenticated remote attacker to cause a DoS condition. The vulnerability is due to improper handling of fragmented IPv6 MVPN traffic by Cisco 1000 Series ASR with ASR1000-ESP40 or ASR1000-ESP100. An attacker could exploit this vulnerability by sending fragmented IPv6 MVPN packets either traversing or destined to a vulnerable system. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software NAT Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper handling of malformed ICMP packets by the affected software. An attacker could exploit this vulnerability by sending crafted ICMP packets that require NAT processing by an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DHCP Client Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP client implementation of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability occurs during the parsing of a crafted DHCP packet. An attacker could exploit this vulnerability by sending crafted DHCP packets to an affected device that is configured as a DHCP client. A successful exploit could allow the attacker to cause a reload of an affected device, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software AAA Login Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Authentication, Authorization, and Accounting (AAA) service for remote Secure Shell Host (SSH) connections to the device for Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the vulnerable device to reload. The vulnerability is due to an error log message when a remote SSH connection to the device fails AAA authentication. An attacker could exploit this vulnerability by attempting to authenticate to the targeted device. An exploit could allow the attacker to cause a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software RSVP Denial of Service VulnerabilityCisco IOS-XEThe Cisco IOS RSVP component contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service. The vulnerability is due to improper parsing of certain RSVP packets. An attacker could exploit this vulnerability by sending certain RSVP packets to the vulnerable device. Repeated exploitation may result in a sustained denial of service condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Cisco Discovery Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the implementation of Cisco Discovery Protocol functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper memory handling by the affected software when the software processes high rates of Cisco Discovery Protocol packets that are sent to a device. An attacker could exploit this vulnerability by sending a high rate of Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to exhaust memory on the affected device, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco IOS XE Software User EXEC Mode Root Shell Access VulnerabilityCisco IOS-XEMultiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerabilities are due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has user EXEC mode (privilege level 1) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Quality of Service Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability.David RiesDRAFTINTERIMDavid RiesACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Layer 4 Redirect Crafted Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Layer 4 Redirect (L4R) processing code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper processing of malformed packets by the configured L4R feature. An attacker could exploit this vulnerability by sending a number of malformed IP version 4 (IPv4) or IP version 6 (IPv6) packets to be processed by the L4R functionality on a device running Cisco IOS XE Software. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Errdisable Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the errdisable per VLAN feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause the device to crash, leading to a denial of service (DoS) condition. The vulnerability is due to a race condition that occurs when the VLAN and port enter an errdisabled state, resulting in an incorrect state in the software. An attacker could exploit this vulnerability by sending frames that trigger the errdisable condition. A successful exploit could allow the attacker to cause the affected device to crash, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Standard Network Time Protocol Query Program nextvar() Missing Length CheckCisco IOS-XEA vulnerability in the standard Network Time Protocol query program (ntpq) could allow a unauthenticated, local attacker to execute a buffer overflow attack. The vulnerability is due to the function nextvar() executing a memcpy() into the name buffer without a proper length check. An attacker could exploit this vulnerability by calling ntpq to read variable names from an untrusted source, such as a user or environment variable. An exploit could allow the attacker to trigger a buffer overflow.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software Locator/ID Separation Protocol Authentication Bypass VulnerabilityCisco IOS-XEA vulnerability in the implementation of the Locator/ID Separation Protocol (LISP) in Cisco IOS XE Software could allow an unauthenticated, remote attacker using an x tunnel router to bypass authentication checks performed when registering an Endpoint Identifier (EID) to a Routing Locator (RLOC) in the map server/map resolver (MS/MR). The vulnerability is due to a logic error introduced via a code regression for the affected software. An attacker could exploit this vulnerability by sending specific valid map-registration requests, which will be accepted by the MS/MR even if the authentication keys do not match, to the affected software. A successful exploit could allow the attacker to inject invalid mappings of EIDs to RLOCs in the MS/MR of the affected software.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Network Address Translation Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the processing of IPv4 packets that require Network Address Translation (NAT) and Multiprotocol Label Switching (MPLS) services of Cisco IOS XE Software for Cisco ASR 1000 Series, Cisco ISR 4300 Series, Cisco ISR 4400 Series, and Cisco Cloud Services 1000v Series Routers could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper processing of IPv4 packets that require NAT and MPLS processing. An attacker could exploit this vulnerability by sending an IPv4 packet to be processed by a Cisco IOS XE device configured to perform NAT and MPLS services. A successful exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Common Flow Table Crafted Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Common Flow Table (CFT) processing of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper processing of IP version 6 (IPv6) packets encapsulated in IP version 4 (IPv4) UDP packets. An attacker could exploit this vulnerability by sending a number of malformed IPv6 packets encapsulated in IPv4 UDP packets when either Media Monitoring (MMON) or Network-Based Application Recognition (NBAR) are configured. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DNS Forwarder Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DNS forwarder functionality of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, corrupt the information present in the device's local DNS cache, or read part of the process memory. The vulnerability is due to a flaw in handling crafted DNS response messages. An attacker could exploit this vulnerability by intercepting and crafting a DNS response message to a client DNS query that was forwarded from the affected device to a DNS server. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition or corruption of the local DNS cache information.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Multicast Source Discovery Protocol Source-Active Message Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Multicast Source Discovery Protocol (MSDP) subsystem of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition. The vulnerability is due to a failure to properly parse MSDP Source-Active (SA) packets that contain unexpected values. An attacker could exploit these vulnerabilities by creating and injecting an MSDP SA packet designed to trigger the issue. A successful exploit could allow the attacker to cause the affected device to restart.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DHCPv6 Relay Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP version 6 (DHCPv6) relay feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of DHCPv6 relay messages. An attacker could exploit this vulnerability by sending a crafted DHCPv6 relay message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Web UI Remote Access Privilege Escalation VulnerabilityCisco IOS-XEA vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to gain elevated privileges on an affected device. The vulnerability exists because the affected software does not reset the privilege level for each web UI session. An attacker who has valid credentials for an affected device could exploit this vulnerability by remotely accessing a VTY line to the device. A successful exploit could allow the attacker to access an affected device with the privileges of the user who previously logged in to the web UI.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software EnergyWise Denial of Service VulnerabilitiesCisco IOS-XEMultiple vulnerabilities in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Telnet Authentication Bypass VulnerabilityCisco IOS-XEA vulnerability in the vty authentication of Cisco IOS XE Software (03.02.xxSE and 03.03.xxSE only) could allow an unauthenticated, remote attacker to access an affected device without authentication and perform actions on the device with the privileges configured for the vty line interface. The vulnerability is due to incomplete validations of the Linux-IOS Internal Network interface. An unauthenticated, remote attacker could exploit this vulnerability only if their source address is in the 192.168.x.2 subnet and the attacker has IP communication to the Cisco IOS XE device. An exploit could allow the attacker to access the device with the privilege level of the vty line interface.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol decodenetnum() Function Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Network Time Protocol daemon could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of user-supplied input. An unauthenticated, remote attacker could exploit the vulnerability by sending malicious requests to the targeted system.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software TACACS+ Client Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the TACACS+ client subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of crafted TACACS+ response packets by the affected software. An attacker could exploit this vulnerability by injecting a crafted TACACS+ packet into an existing TACACS+ session between an affected device and a TACACS+ server or by impersonating a known, valid TACACS+ server and sending a crafted TACACS+ packet to an affected device when establishing a connection to the device. To exploit this vulnerability by using either method, the attacker must know the shared TACACS+ secret and the crafted packet must be sent in response to a TACACS+ request from a TACACS+ client. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco IOS XE Software MACsec MKA Using EAP-TLS Authentication Bypass VulnerabilityCisco IOS-XEA vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco IOS Software IKEv2 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device that would lead to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device to be processed. An exploit could allow the attacker to cause a reload of the affected device that would lead to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Command Injection VulnerabilityCisco IOS-XEMultiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerabilities exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain custom arguments. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE for Cisco 1000 Series ASR Routers Denial of Service VulnerabilityCisco IOS-XEA vulnerability in PPP over Ethernet (PPPoE) processing on Cisco IOS XE for Cisco 1000 Series ASR routers could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. The vulnerability is due to improper processing of malformed PPPoE Active Discovery Request (PADR) packets. An attacker could exploit this vulnerability by sending PADR packets as part of PPPoE establishment. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and Cisco IOS XE Software SM-1T3/E3 Service Module Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of user input. An attacker could exploit this vulnerability by first connecting to the SM-1T3/E3 module console and entering a string sequence. A successful exploit could allow the attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a DoS condition on an affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Autonomic Networking Infrastructure Spoofed Autonomic Networking Messages Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and IOS XE Software could allow an unauthenticated, remote attacker to create a denial of service condition disrupting access to the autonomic domain from a specific Autonomic Networking (AN) node. The vulnerability is due to an overloaded AN message which can reset the finite state machine. An attacker could exploit this vulnerability by sending crafted AN messages that spoof an existing AN node. An exploit could allow the attacker to disrupt access to the autonomic domain from the spoofed node.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software PPTP Traffic Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the PPTP ALG feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper handling of PPTP packets that are being inspected as part of the NAT feature on Cisco IOS XE Software. An attacker could exploit this vulnerability by sending a large number of PPTP packets to traverse a vulnerable system that is configured for NAT. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software for Cisco Catalyst Switches IPv4 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software and Cisco IOS XE Software Session Initiation Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the SIP functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a device reload. The vulnerability is due to incorrect processing of specific SIP messages. An attacker could exploit this vulnerability by sending specific SIP messages, which may be considered well formed or crafted to the SIP gateway. An exploit could allow the attacker to trigger a device reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software VLAN Trunking Protocol Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to a logic error in how the affected software handles a subset of VTP packets. An attacker could exploit this vulnerability by sending VTP packets in a sequence that triggers a timeout in the VTP message processing code of the affected software. A successful exploit could allow the attacker to impact the ability to create, modify, or delete VLANs and cause a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Autonomic Networking Infrastructure Routing Protocol for Low-Power and Lossy Networks VulnerabilityCisco IOS-XEA vulnerability in the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) of Cisco IOS XE could allow an unauthenticated, adjacent attacker to inject routes into the autonomic control plane (ACP). The vulnerability is due to RPL being active on ACP as well as the external Autonomic Networking Infrastructure (ANI) interfaces. An attacker could exploit this vulnerability by sending crafted RPL advertisements to the ANI device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Crafted IPv6 Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in IP version 6 (IPv6) parsing of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of crafted IPv6 packets. An attacker could exploit this vulnerability by sending crafted IPv6 packets destined to an affected device. An exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11OpenSSL Alternative Chains Certificate Forgery VulnerabilityCisco IOS-XEOpenSSL contains a vulnerability that could allow an unauthenticated, remote attacker to cause certain checks on untrusted certificates to be bypassed, enabling the attacker to forge "trusted" certificates that could be used to conduct man-in-the-middle attacks. The vulnerability is due to an error in the implementation of the logic for finding an alternative certificate chain if the first attempt to build such a chain fails. An unauthenticated, remote attacker could exploit the vulnerability by submitting a crafted certificate chain to an affected device during SSL, TLS, or DTLS authentication. A successful exploit could allow the attacker to cause certain checks on untrusted certificates to be bypassed, enabling the attacker to forge "trusted" certificates that could be used to conduct man-in-the-middle attacks.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco ASR 1000 Series Aggregation Services Routers SNMP High CPU Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Simple Network Management Protocol (SNMP) functions of Cisco ASR 1000 Series Aggregation Services Routers running Cisco IOS XE Software Release 3.13.6S, 3.16.2S, or 3.17.1S could allow an authenticated, remote attacker to cause high CPU usage on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to an incorrect initialized variable. An attacker could exploit this vulnerability by performing SNMP polling on MIBs and using only Interface Index (ifIndex) values. A successful exploit could allow the attacker to increase CPU usage to 99% on an affected device and cause a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DHCP Version 4 Relay Reply Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Cisco IOS Software and Cisco IOS XE Software function that restores encapsulated option 82 information in DHCP Version 4 (DHCPv4) packets could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of encapsulated option 82 information that it receives in DHCPOFFER messages from DHCPv4 servers. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device, which the device would then forward to a DHCPv4 server. When the affected software processes the option 82 information that is encapsulated in the response from the server, an error could occur. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software and IOS XE Software mDNS Gateway Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the multicast DNS (mDNS) gateway function of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to reload the vulnerable device. The vulnerability is due to improper validation of mDNS packets. An attacker could exploit this vulnerability by sending malformed IP version 4 (IPv4) or IP version 6 (IPv6) packets on UDP port 5353. An exploit could allow the attacker to cause a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Shell Access Authentication Bypass VulnerabilityCisco IOS-XEA vulnerability in the shell access request mechanism of Cisco IOS XE Software could allow an authenticated, local attacker to bypass authentication and gain unrestricted access to the root shell of an affected device. The vulnerability exists because the affected software has insufficient authentication mechanisms for certain commands. An attacker could exploit this vulnerability by requesting access to the root shell of an affected device, after the shell access feature has been enabled. A successful exploit could allow the attacker to bypass authentication and gain unrestricted access to the root shell of the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS Software and Cisco IOS XE Software NTP Access Group VulnerabilityCisco IOS-XEA vulnerability in the implementation of the ntp access-group command in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the configured Network Time Protocol (NTP) access group and query the affected NTP-configured server for the time. The vulnerability is due to improper implementation of the ntp access-group command in certain Cisco IOS Software and Cisco IOS XE Software versions. An attacker could exploit this vulnerability by sending NTP query packets to an affected NTP server configured to deny all requests. An exploit could allow the attacker to bypass the configured NTP access group and query the affected NTP-configured server for the time.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco Products IPv6 Neighbor Discovery Crafted Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IP Version 6 (IPv6) packet processing functions of multiple Cisco products could allow an unauthenticated, remote attacker to cause an affected device to stop processing IPv6 traffic, leading to a denial of service (DoS) condition on the device. The vulnerability is due to insufficient processing logic for crafted IPv6 packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 Neighbor Discovery (ND) packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to stop processing IPv6 traffic, leading to a DoS condition on the device. This vulnerability is not Cisco specific: any IPv6 processing unit not capable of dropping such packets early in the processing path or in hardware is affected by this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Multiple Cisco Products OSPF LSA Manipulation VulnerabilityCisco IOS-XEMultiple Cisco products are affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. This vulnerability could allow an unauthenticated, remote attacker to take full control of the OSPF Autonomous System (AS) domain routing table, allowing the attacker to intercept or black-hole traffic. The attacker could exploit this vulnerability by injecting crafted OSPF packets. Successful exploitation could cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update throughout the OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters within the LSA database on the target router. This vulnerability can only be triggered by sending crafted unicast or multicast OSPF LSA type 1 packets. No other LSA type packets can trigger this vulnerability. The Fabric Shortest Path First (FSPF) protocol is not affected by this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software SNMP Subsystem Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the SNMP subsystem of Cisco IOS XE software could allow an authenticated, remote attacker to create a denial of service (DoS) condition. The vulnerability is due to an attempt to double free a region of memory when processing a series of SNMP read requests that contains certain criteria for a specific object ID (OID). An attacker who can authenticate to an affected device may submit a series of valid but specially formed SNMP requests designed to trigger the vulnerability. Successful exploitation will cause the device to restart because of an attempt to access an invalid memory region.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Catalyst 4500E series switch with Supervisor Engine 7L-E Denial of Service VulnerabilityCisco IOS-XECisco Catalyst 4500E series switches with Supervisor Engine 7L-E contain a denial of service (DoS) vulnerability that could allow an unauthenticated, remote attacker to cause the device supervisor card to reload. The vulnerability is due to improper processing of malformed network packets. An unauthenticated, remote attacker could exploit this vulnerability by sending specially crafted packets to or through the affected device. An exploit could allow the attacker to reload the affected device supervisor card, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software SNMP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the SNMP module of Cisco IOS XE Software could allow an authenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to frequent polling of certain MIBs on an affected device. An attacker could exploit this vulnerability by sending continuous SNMP polling requests. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software EnergyWise Denial of Service VulnerabilitiesCisco IOS-XEMultiple vulnerabilities in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Wireless Controller Manager Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the wireless controller manager of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a restart of the switch and result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted association request. An exploit could allow the attacker to cause the switch to restart.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Plug-and-Play PKI API Certificate Validation VulnerabilityCisco IOS-XEA vulnerability in the Cisco Network Plug and Play application of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data by using an invalid certificate. The vulnerability is due to insufficient certificate validation by the affected software. An attacker could exploit this vulnerability by supplying a crafted certificate to an affected device. A successful exploit could allow the attacker to conduct man-in-the-middle attacks to decrypt confidential information on user connections to the affected software.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco ASR 1000 Series Routers ESP Module Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Embedded Services Processor (ESP) module of Cisco ASR 1000 Series Routers running Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of malformed H.323 packets by an affected device when the device is configured to use Network Address Translation (NAT). An unauthenticated, remote attacker could exploit this vulnerability by sending malformed H.323 packets to a targeted device. A successful exploit could cause the ESP module on the device to crash, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE 3S Platforms Series root Shell License Bypass VulnerabilityCisco IOS-XEA vulnerability in one of the diagnostic commands in the Cisco IOS XE operating system for Cisco IOS XE 3S platforms could allow an authenticated, privileged, local attacker to gain restricted root shell access. The root shell is provided for advanced troubleshooting with Cisco Technical Assistance Center (TAC) engineers and requires a license. The vulnerability occurs because the parameters to diagnostic commands at the command-line interface (CLI) are not properly validated. An attacker could exploit this vulnerability by authenticating to the affected device at privileged level 15 and providing crafted parameters to the diagnostic commands. An exploit could allow the authenticated, privileged attacker to bypass the license required for root shell access. If the authenticated user obtains root shell access, further compromise may be possible.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Missing Trusted Key CheckCisco IOS-XEA vulnerability in the Network Time Protocol daemon (ntpd) could allow an authenticated, remote attacker to leverage any trusted key, not just the trusted key for its address. The vulnerability is exists because ntpd does not properly verify that the key being used matches the proper servers' key. An attacker could exploit this vulnerability by sending packets with any trusted key, as long as the keyid references another key the systems share and that key is used to compute the message authentication code (MAC). An exploit could allow the attacker to masquerade as another configured trusted association.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11IKEv1 Information Disclosure Vulnerability in Multiple Cisco ProductsCisco IOS-XEA vulnerability in Internet Key Exchange version 1 (IKEv1) packet processing code in Cisco IOS, Cisco IOS XE, and Cisco IOS XR Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles IKEv1 security negotiation requests. An attacker could exploit this vulnerability by sending a crafted IKEv1 packet to an affected device configured to accept IKEv1 security negotiation requests. A successful exploit could allow the attacker to retrieve memory contents, which could lead to the disclosure of confidential information.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Internet Group Management Protocol Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the Internet Group Management Protocol (IGMP) packet-processing functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust buffers on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to the affected software insufficiently processing IGMP Membership Query packets that are sent to an affected device. An attacker could exploit this vulnerability by sending a large number of IGMP Membership Query packets, which contain certain values, to an affected device. A successful exploit could allow the attacker to exhaust buffers on the affected device, resulting in a DoS condition that requires the device to be reloaded manually.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11vuln-cisco-sa-20180926-ospfv3-dosCisco IOS-XEA vulnerability in the Open Shortest Path First version 3 (OSPFv3) implementation in Cisco IOS and IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. The vulnerability is due to incorrect handling of specific OSPFv3 packets. An attacker could exploit this vulnerability by sending crafted OSPFv3 Link-State Advertisements (LSA) to an affected device. An exploit could allow the attacker to cause an affected device to reload, leading to a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco IOS XE Software Web UI Privilege Escalation VulnerabilityCisco IOS-XEA vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate their privileges on an affected device. The vulnerability is due to incorrect default permission settings for new users who are created by using the web UI of the affected software. An attacker could exploit this vulnerability by using the web UI of the affected software to create a new user and then logging into the web UI as the newly created user. A successful exploit could allow the attacker to elevate their privileges on the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Autonomic Networking Infrastructure Certificate Revocation VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. The vulnerability exists because the affected software does not transfer certificate revocation lists (CRLs) across Autonomic Control Plane (ACP) channels. An attacker could exploit this vulnerability by connecting an autonomic node, which has a known and revoked certificate, to the autonomic domain of an affected system. A successful exploit could allow the attacker to insert a previously trusted autonomic node into the autonomic domain of an affected system after the certificate for the node has been revoked.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software DHCP Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP implementation of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability occurs during the parsing of crafted DHCP packets. An attacker could exploit this vulnerability by sending crafted DHCP packets to an affected device that has the DHCP server or DHCP relay feature enabled. An exploit could allow the attacker to cause a reload of an affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Metadata DoS Vulnerability (CSCug75942)Cisco IOS-XEA vulnerability exists in the metadata function of Cisco IOS Software that could allow an unauthenticated, remote attacker to reload the vulnerable device. The vulnerability is due to improper handling of transit RSVP packets that need to be processed by the metadata infrastructure. An attacker could exploit this vulnerability by sending malformed RSVP packets. An exploit could allow the attacker to cause an extended DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software SIP VulnerabilityCisco IOS-XEA vulnerability in the Session Initiation Protocol (SIP) implementation in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device. The vulnerability is due to incorrect processing of specific SIP messages. An attacker could exploit this vulnerability by sending a crafted SIP message on an established call or initiating a call that includes the crafted SIP message, which would trigger a device reload. Only traffic destined to the device can trigger the vulnerability; transit SIP traffic is not an exploit vector. This vulnerability can be exploited with SIP over IP version 4 (IPv4) or IP version 6 (IPv6) communications protocol. This vulnerability can be exploited with SIP over UDP traffic or SIP over TCP traffic.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Static Credential VulnerabilityCisco IOS-XEA vulnerability in Cisco IOS XE Software could allow an unauthenticated, remote attacker to log in to a device running an affected release of Cisco IOS XE Software with the default username and password that are used at initial boot. The vulnerability is due to an undocumented user account with privilege level 15 that has a default username and password. An attacker could exploit this vulnerability by using this account to remotely connect to an affected device. A successful exploit could allow the attacker to log in to the device with privilege level 15 access.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco cBR-8 Converged Broadband Router vty Integrity VulnerabilityCisco IOS-XEA vulnerability in Cisco IOS XE Software running on Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause a configuration integrity change to the vty line configuration on an affected device. The vulnerability is due to a logic processing error that exists if an affected device is configured with the Downstream Resiliency and Downstream Resiliency Bonding Group features. An attacker could exploit this vulnerability by continuously trying to establish Telnet or SSH connections to a targeted device. A successful exploit could allow the attacker to trigger an integrity issue with the vty line configuration.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Autonomic Networking Infrastructure Certificate Chain Validation VulnerabilityCisco IOS-XEA vulnerability in certificate validation for Autonomic Network Infrastructure (ANI) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to provide an invalid message and have the ANI device accept it. The vulnerability is due to incomplete certificate validation. An attacker could exploit this vulnerability by sending crafted messages to the ANI device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and Cisco IOS XE Software Border Gateway Protocol Message Processing Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Border Gateway Protocol (BGP) message processing functions of Cisco IOS and IOS XE Software could allow an authenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper processing of crafted BGP attributes. An attacker could exploit this vulnerability by sending crafted BGP messages to an affected device for processing when certain conditions are met. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11TLS Renegotiation Remote Man-in-the-Middle Attack VulnerabilityCisco IOS-XEMultiple Transport Layer Security (TLS) implementations contain a vulnerability when renegotiating a TLS session that could allow an unauthenticated, remote attacker to conduct a man-in-the-middle attack. The vulnerability exists during a TLS renegotiation process. If an attacker can intercept traffic from a client to a TLS server, the attacker could stage a rogue TLS server to intercept that traffic and appear to authenticate the client to what the client thinks is the desired TLS server. The attacker is then able to authenticate to the legitimate TLS server and thus stage a man-in-the-middle attack. However, the attacker would not be able to view the contents of the session and would only be able to inject data or requests into it. Proof-of-concept code that exploits this vulnerability is publicly available. OpenSSL has confirmed this vulnerability in a changelog and released updated software. To exploit this vulnerability, the attacker must be able to intercept traffic from a TLS client to a TLS server. In many cases, this may require the attacker to have access to a network that is adjacent to the targeted user's system. Another possibility would be for the attacker to have access to a network that is adjacent to a legitimate TLS server. This vulnerability is likely to affect multiple implementations of TLS.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE Software and Cisco ASA 5500-X Series Adaptive Security Appliance IPsec Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to improper processing of malformed IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to be processed by an affected device. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Autonomic Networking Infrastructure Device Reload Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload. The vulnerability is due to insufficient validation of received Autonomic Networking (AN) messages. An attacker could exploit this vulnerability by sending crafted AN messages that spoof the target device. An exploit could allow the attacker to trigger an affected system to reload and cause a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco ASR 900 Series Aggregation Services Routers Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Transaction Language 1 (TL1) code of Cisco ASR 900 Series routers could allow an unauthenticated, remote attacker to cause a reload of, or remotely execute code on, the affected system. The vulnerability exists because the affected software performs incomplete bounds checks on input data. An attacker could exploit this vulnerability by sending a malicious request to the TL1 port, which could cause the device to reload. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the affected system.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Autonomic Control Plane Channel Information Disclosure VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to reset the Autonomic Control Plane (ACP) of an affected system and view ACP packets that are transferred in clear text within an affected system. The vulnerability is due to unknown reasons. An attacker could exploit this vulnerability by capturing and replaying ACP packets that are transferred within an affected system. A successful exploit could allow the attacker to reset the ACP of an affected system, resulting in a denial of service (DoS) condition. A successful exploit could also allow the attacker to capture and view ACP packets, which should have been encrypted over the ACP, in clear text.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DHCP Version 4 Relay Heap Overflow Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow condition on the affected device, which will cause the device to reload and result in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Simple Network Management Protocol Subsystem Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a race condition that could occur when the affected software processes an SNMP read request that contains certain criteria for a specific object ID (OID) and an active crypto session is disconnected on an affected device. An attacker who can authenticate to an affected device could trigger this vulnerability by issuing an SNMP request for a specific OID on the device. A successful exploit will cause the device to restart due to an attempt to access an invalid memory region. The attacker does not control how or when crypto sessions are disconnected on the device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software IKEv2 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IKEv2 module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service by memory depletion. The vulnerability is due to improper management of system resources. An attacker could exploit this vulnerability by crafting IKEv2 negotiations. An exploit could allow the attacker to cause a denial of service.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Web User Interface Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a double-free-in-memory handling by the affected software when specific HTTP requests are processed. An attacker could exploit this vulnerability by sending specific HTTP requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE Software Crafted TCP Packet Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the AppNav component of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload and may allow arbitrary code execution on the affected system. The vulnerability is due to improper processing of crafted TCP packets. An attacker could exploit this vulnerability by sending a crafted TCP packet that needs to be processed by the AppNav component configured on an affected device. An exploit could allow the attacker to cause an affected device to reload or execute arbitrary code in the forwarding engine.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software IPv6 Neighbor Discovery Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPv6 neighbor discovery (ND) handling of Cisco IOS XE Software on ASR platforms could allow an unauthenticated, adjacent attacker to cause an affected device to crash. The vulnerability is due to insufficient bounds on internal tables. An attacker could exploit this vulnerability by flooding an adjacent IOS XE device with specific ND messages. An exploit could allow the attacker to deplete the available memory, possibly causing an affected device to crash.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS RSVP VulnerabilityCisco IOS-XEA vulnerability in the implementation of the Resource Reservation Protocol (RSVP) in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker cause the device to reload. This vulnerability could be exploited repeatedly to cause an extended denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Malformed EoGRE Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the EoGRE feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of malformed EoGRE packets. An attacker could exploit this vulnerability by sending malformed IPv4 or IPv6 EoGRE packets to an affected device configured with an EoGRE interface; this vulnerability cannot be exploited by sending malformed EoGRE packets to traverse a vulnerable system. An exploit could allow the attacker to cause a reload of the affected device, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Authentication, Authorization, and Accounting Login Authentication Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11vuln_cisco-sa-20180926-cdpCisco IOS-XEA vulnerability in the Cisco Discovery Protocol (CDP) module of Cisco IOS XE Software Releases 16.6.1 and 16.6.2 could allow an unauthenticated, adjacent attacker to cause a memory leak that may lead to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain CDP packets. An attacker could exploit this vulnerability by sending certain CDP packets to an affected device. A successful exploit could cause an affected device to continuously consume memory and eventually result in a memory allocation failure that leads to a crash, triggering a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS Software and IOS XE Software TCP Packet Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the TCP input module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak and eventual reload of the affected device. The vulnerability is due to improper handling of certain crafted packet sequences used in establishing a TCP three-way handshake. An attacker could exploit this vulnerability by sending a crafted sequence of TCP packets while establishing a three-way handshake. A successful exploit could allow the attacker to cause a memory leak and eventual reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Off-Path Broadcast Mode Denial of ServiceCisco IOS-XEA vulnerability the Network Time Protocol daemon (ntpd) could allow an unauthenticated, remote attacker to prevent clients from synchronizing to a time server. The vulnerability is due to the improper handling of malicious packets by the broadcast server. An attacker could exploit this vulnerability by sending malicious, authenticated packets to the broadcast network. An exploit could allow the attacker to prevent the broadcast clients from synchronizing with configured time servers.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software and Cisco IOS XE Software EnergyWise Crafted Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the EnergyWise module of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device. The vulnerability is due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted EnergyWise packet to be processed by an affected device. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software IPv6 Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to a device that is running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature. A device must meet two conditions to be affected by this vulnerability: The device must be running a version of Cisco IOS Software or Cisco IOS XE Software that supports ANI (regardless of whether ANI is configured) The device must have a reachable IPv6 interface An exploit could allow the attacker to cause the affected device to reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software IPv6 Multicast Traffic Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software contains a vulnerability that could allow an unauthenticated remote attacker to cause a DoS condition. The vulnerability is due to improper handling of fragmented IPv6 multicast traffic by Cisco 1000 Series ASR with ASR1000-ESP40 or ASR1000-ESP100. An attacker could exploit this vulnerability by sending fragmented IPv6 multicast packets either traversing or destined to a vulnerable system. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Smart Install Denial of Service VulnerabilityCisco IOS-XEThe Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software IKEv1 State Machine Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange (IKEv1) state machine of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to tear down valid IPsec connections, resulting in a partial denial of service (DoS) condition. The vulnerability is due to insufficient condition checks in the IKEv1 state machine. An attacker could exploit this vulnerability by sending a spoofed, specific IKEv1 packet to an endpoint of an IPsec tunnel. A successful exploit could allow the attacker to tear down IPsec tunnels that terminate on the endpoint, causing a partial DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Internet Key Exchange Version 2 Fragmentation Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Internet Key Exchange (IKE) version 2 (v2) fragmentation code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected system. The vulnerability is due to an improper handling of crafted, fragmented IKEv2 packets. An attacker could exploit this vulnerability by sending crafted UDP packets to the affected system. An exploit could allow the attacker to cause a reload of the affected system. Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software DHCPv6 Denial Of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP version 6 (DHCPv6) server implementation of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper parsing of malformed DHCPv6 packets. An attacker could exploit this vulnerability by sending malformed DHCPv6 packets to be processed by an affected device. An exploit could allow the attacker to cause a memory leak and eventual reload of an affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software DHCP Version 4 Relay Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Fragmented Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the high-speed logging (HSL) functionality of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of fragmented IP packets. An attacker could exploit this vulnerability by sending a large amount of oversized IP packets that need to be fragmented and processed by the Network Address Translation (NAT) and HSL functionality on an affected device. An exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Smart Install Memory Leak VulnerabilityCisco IOS-XEThe Smart Install client feature in Cisco IOS and IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a memory leak and eventual denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect handling of image list parameters. An attacker could exploit this vulnerability by sending crafted Smart Install packets to TCP port 4786. A successful exploit could cause a Cisco Catalyst switch to leak memory and eventually reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software RSVP Interface Queue Wedge VulnerabilityCisco IOS-XEA vulnerability in the RSVP feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger an interface queue wedge on the affected device. The vulnerability is due to improper parsing of UDP RSVP packets. An attacker could exploit this vulnerability by sending UDP RSVP packets to the vulnerable device. An exploit could cause Cisco IOS Software and Cisco IOS XE Software to incorrectly process incoming packets, resulting in an interface queue wedge, which can lead to loss of connectivity, loss of routing protocol adjacency, and other DoS conditions.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Startup Script Local Command Execution VulnerabilityCisco IOS-XEA vulnerability in a startup script of Cisco IOS XE Software could allow an unauthenticated attacker with physical access to the targeted system to execute arbitrary commands on the underlying operating system with the privileges of the root user. The vulnerability is due to insufficient validation of ROMMON variables values. An attacker could exploit this vulnerability by manipulating the content of some ROMMON variables, which will allow an external script containing the command to execute at boot time. A reload of the affected system is needed to exploit the vulnerability. An attacker would need console access to exploit this vulnerability.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and Cisco IOS XE ntp Subsystem Unauthorized Access VulnerabilityCisco IOS-XEA vulnerability in the ntp subsystem of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to mobilize ntp associations. The vulnerability is due to missing authorization checks on certain ntp packets. An attacker could exploit this vulnerability by ingressing malicious packets to the ntp daemon. An exploit could allow the attacker to control the time of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE OTV Processing Code Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Overlay Transport Virtualization (OTV) processing code of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. The vulnerability is due to improper processing of oversized OTV frames passing through an affected device. An attacker could exploit this vulnerability by sending a number of packets that are processed as oversized OTV frames that may require fragmentation and reassembly by an affected device. An exploit could allow the attacker to cause a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS-XE Fragmented Packet Resource Consumption VulnerabilityCisco IOS-XEA vulnerability in the packet reassembly subsystem of Cisco IOS-XE could allow an unauthenticated, remote attacker to consume CPU resources which may lead to a denial of service (DoS) condition. The vulnerability is due to an error message that is triggered to the console and the syslog when a fragmented packet cannot be properly reassembled. When an affected device fails to successfully perform reassembly, instead of silently dropping the fragments, the ATTN-3-SYNC_TIMEOUT error message may be triggered. On a device that is highly loaded, this condition may be leveraged to consume CPU resources that may be required by another process, resulting in a temporary halt of the queued process. In some situations this may lead to a drop of transit traffic. An attacker could trigger this vulnerability by sending a series of IPv4 or IPv6 fragments, that are designed to trigger the error message, directly to the affected device. Cisco IOS-XE devices rate-limit error messages to once every 60 seconds by default.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Multiple Cisco Products libSRTP Denial of Service VulnerabilityCisco IOS-XECisco released version 1.5.3 of the Secure Real-Time Transport Protocol (SRTP) library (libSRTP), which addresses a denial of service (DoS) vulnerability. Multiple Cisco products incorporate a vulnerable version of the libSRTP library. The vulnerability is in the encryption processing subsystem of libSRTP and could allow an unauthenticated, remote attacker to trigger a DoS condition. The vulnerability is due to improper input validation of certain fields of SRTP packets. An attacker could exploit this vulnerability by sending a crafted SRTP packet designed to trigger the issue to an affected device. The impact of this vulnerability on Cisco products may vary depending on the affected product. Details about the impact on each product are outlined in the "Conditions" section of each Cisco bug for this vulnerability. The bug IDs are listed at the top of this advisory and in the table in "Vulnerable Products."David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Malformed ICMP Packet Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Zone-Based Firewall (ZBFW) TCP or UDP inspection feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of malformed ICMP error packets traversing a vulnerable device that belong to a TCP or UDP connection that is inspected by a ZBFW. An attacker could exploit this vulnerability by sending a number of malformed ICMP error packets that belong to an inspected TCP or UDP session. An exploit could allow the attacker to cause a reload of the affected device, resulting in DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Plug and Play Agent Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the Cisco Network Plug and Play agent, also referred to as the Cisco Open Plug-n-Play agent, of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by sending invalid data to the Cisco Network Plug and Play agent on an affected device. A successful exploit could allow the attacker to cause a memory leak on the affected device, which could cause the device to reload.David RiesDRAFTINTERIMACCEPTEDDavid RiesACCEPTED5.11Cisco IOS XE Command Injection VulnerabilityCisco IOS-XEMultiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerabilities exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain custom arguments. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE Software for Cisco ASR 1000 Series and cBR-8 Routers Line Card Console Access VulnerabilityCisco IOS-XEA vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device's operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device's operating system.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software IPv6 Snooping Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IPv6 snooping feature from the first-hop security features in Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of IPv6 ND packets that use the Cryptographically Generated Address (CGA) option. An attacker could exploit this vulnerability by sending a malformed packet to an affected device where the IPv6 Snooping feature is enabled.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Network Time Protocol Stack Exhaustion Denial of ServiceCisco IOS-XEA vulnerability of the Network Time Protocol daemon (ntpd) could allow an authenticated, remote attacker to cause the ntpd to crash by exhausting the call stack. The vulnerability exists because function calls to list_restrict4() or list_restrict6() can be made to exhaust space on the call stack. An attacker could exploit this vulnerability by performing an ntpdc reslist command against a device that has a large number of NTP restrictions in place. An exploit could allow the attacker to cause the ntpd to crash.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Standard Network Time Protocol Query Program Replay AttackCisco IOS-XEA vulnerability in the Standard Network Time Protocol query program (ntpq) could allow an unauthenticated, remote attacker to replay a previously captured ntpq command. The vulnerability is due to an invalid checking of the sequence number. An attacker could exploit this vulnerability by capturing an authenticated ntpq command that was executed and then replaying back the command at a later stage. An exploit could allow the attacker to replay previously captured ntpq commands.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11OpenSSL CMS Verify Unknown Hash Function Denial of Service VulnerabilityCisco IOS-XEA vulnerability in OpenSSL could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper processing of user-supplied input by the affected software. An unauthenticated, remote attacker could exploit the vulnerability by transmitting crafted messages to the targeted system. Processing such messages could allow the attacker to cause the affected software to stop responding. A successful exploit could allow the attacker to cause a DoS condition on the targeted system.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software L2TP Traffic Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software contains a vulnerability that could allow an unauthenticated remote attacker to cause a DoS condition. The vulnerability is due to improper handling of specific L2TP packets by Cisco 1000 ASR. An attacker could exploit this vulnerability by sending a large number of specific L2TP packets to a vulnerable system; this vulnerability cannot be triggered by L2TP traffic transiting a vulnerable device. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and Cisco IOS XE Crafted DHCPv6 sequence Denial of Service VulnerabilityCisco IOS-XEA vulnerability in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of DHCPv6 packets for a SOLICIT message for an Identity Association for Non-Temporary Addresses (IA-NA) by a device running the affected software. An unauthenticated, adjacent attacker could exploit this vulnerability by sending a crafted sequence exchange of DHCPv6 packets for a SOLICIT message for an IA-NA to an affected device. If successful, the attacker could cause the device to crash, resulting in a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco Autonomic Networking Infrastructure Overwrite VulnerabilityCisco IOS-XEA vulnerability in the multicast Domain Name System (mDNS) used for autonomic networking in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to read or overwrite autonomic networking services discovered via mDNS. The vulnerability is due to unconstrained autonomic networking mDNS. An attacker could exploit this vulnerability by capturing data on the segment or sending crafted mDNS responses.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software TFTP Server Denial of Service VulnerabilityCisco IOS-XEA vulnerability in TFTP server functionality of Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload or hang. The vulnerability is due to incorrect management of memory when handling TFTP requests. An attacker could exploit this vulnerability by making a number of TFTP requests to the affected device. A successful exploit could allow the attacker to cause the device to reload or hang.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software IP Header Sanity Check Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Cisco Express Forwarding processing module that checks the sanity of IP headers on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, leading to a denial of service (DoS) condition. The vulnerability is due to improper processing of Multiprotocol Label Switching (MPLS) packets. When certain additional features are configured, an attacker could exploit this vulnerability by sending MPLS packets to traverse and exit an affected device as IP packets. An exploit could allow the attacker to cause the device to reload, leading to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software IP Detail Record Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the IP Detail Record (IPDR) code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected system to reload. The vulnerability is due to improper handling of IPDR packets. An attacker could exploit this vulnerability by sending crafted IPDR packets to an affected system. A successful exploit could cause the device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software Session Initiation Protocol Application Layer Gateway Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper processing of SIP packets in transit while NAT is performed on an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted SIP packets via UDP port 5060 through an affected device that is performing NAT for SIP packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.David RiesDRAFTINTERIMACCEPTEDACCEPTED5.11Cisco IOS XE Software Bridge Domain Interface Denial of Service VulnerabilityCisco IOS-XECisco IOS XE Software contains a vulnerability that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper handling of packets by Cisco 1000 Series ASR configured for bridge domain interface (BDI). An attacker could exploit this vulnerability by sending packets that will traverse a vulnerable system. This vulnerability cannot be triggered by sending traffic to a vulnerable device. A successful exploit could allow the attacker to cause a system to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software PPPoE Denial of Service VulnerabilityCisco IOS-XEA vulnerability in the PPP over Ethernet (PPPoE) processing code of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device, which could lead to a denial of service (DoS) condition. The vulnerability is due to improper processing of certain malformed PPPoE packets. An attacker could exploit this vulnerability by sending a malformed PPPoE packet to an IOS XE ASR1000 device configured with PPPoE termination. An exploit could allow the attacker to cause a reload of the affected device, which could lead to a DoS condition.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Bash Code Injection Vulnerability via Specially Crafted Environment Variables VulnerabilityCisco IOS-XEThe bash shell allows shell variables and functions to be exported to a child from its parent through the process environment. Function definitions are passed using environment variables that share the name of the function and start with () {. The child bash process does not stop processing and executing code after processing the closing brace } which is passed in the function definition. An attacker could define a function variable such as: FUNCT=() { ignored; }; /bin/id to execute /bin/id when the environment is imported into the child process. The impact of this vulnerability on Cisco products may vary depending on the affected product because some attack vectors such as SSH, require successful authentication to be exploited and may not result in any additional privileges granted to the user.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS XE Software HTTP Command Injection VulnerabilityCisco IOS-XEA vulnerability in the web framework of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of HTTP parameters supplied by the user. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected web page parameter. The user must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS and IOS XE Software Smart Install Remote Code Execution VulnerabilityCisco IOS-XEA vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device Allowing the attacker to execute arbitrary code on the device Causing an indefinite loop on the affected device that triggers a watchdog crashDavid RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11Cisco IOS Software mDNS Gateway Memory Leak VulnerabilityCisco IOS-XEA vulnerability in the multicast Domain Name System (mDNS) implementation of Cisco IOS Software could allow an unauthenticated, remote attacker to cause a memory leak condition, which could eventually lead to an interface wedge or a reload of the affected device. The vulnerability is due to improper parsing of malformed mDNS packets sent to an affected device. An attacker could exploit this vulnerability by sending malformed mDNS packets to be processed by an affected device. An exploit could allow the attacker to cause a memory leak condition, which could eventually lead to an interface wedge or a reload of the affected device.David RiesDRAFTINTERIMACCEPTEDDavid RiesDavid RiesDavid RiesDavid RiesDavid RiesACCEPTED5.11^ip http secure-serverenergywise^ip multicast-routing^transport input^ip http active-session-modules none^ntp access-group query-only^mpls ip^ip http (secure-)?serverno cdp run^wireless (mobility controller|management interface)^tftp-server^energywiseaaa\s+authorization\s+exec^no snmp-server^ip nat^crypto isakmp keepalive^ip http serverautonomicno ip http secure-server^router bgp^ipv(4|6) map-servershow licenseshow autonomic deviceshow processesshow license summaryshow tcp brief allshow ip socketsshow zone securityshow running-config allshow subsys class protocolshow errdisable detect | include vlanshow pnp profileshow udpshow vtp statusshow ip socketshow ip dhcp poolshow clustershow cdp interfaceshow policy-map type inspect zone-pairshow running-config | include ^line vty|transport inputshow versionshow vstack configshow ipv6 dhcp interfaceshow ipv6 interface briefshow cdp globalshow control-plane host open-portsshow opendns configshow running-config | include ^interface|ntp multicastshow autonomic registrarshow ospfv3show diag all eeprom | include SM-X-1T3show processes | include SIPshow port-securityshow running-configshow running configshow process cpushow inventoryshow bgp l2vpn evpn all^interface^\s*ipv6 nd cache interface-limitno ip http server^ip http secure-active-session-modules none^ntp ^cdp run^no username cisco^transport (input|preferred).*telnet^ntp server^snmp-server^\s*no ipv6 nd cache interface-limit^0*3\.0*5\.0*0\.?E$^0*3\.0*10\.0*01\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*5\.0*0\.?S$crypto ikev2 fragmentationcisco ASR1[0-9][0-9][0-9][^0-9]\s+ip nat .* vrf aaa authentication fail-messageip dhcp poolip\s+rsvp\s+rewrite egressMatch: protocol (tcp|udp)ip ssh pubkey-chain\n.*\susername .*\n\s+key-hash ssh-rsaCatalyst 45[0-9][0-9][^0-9]+L3 Switchtcp .* LISTEN\s+ip nat (inside|outside)ip dns serveripv6\s+addressrouter\s+ospfencapsulation l2tpv3transport type persistent webuiInspect^\s*ip nat (inside|outside|enable)^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*13\.0*0\.?S$^0*16\.0*1\.0*1$crypto gdoi enableno ip nat service sipudp.*:5353 ip cef accountingip dhcp-client network-discoverycisco CSR1[0-9][0-9][0-9]vip msdp\s+67\s+ipdr exporter startaccept-dialincat4500eCatalyst 368[0-9][^0-9]+L3 Switch17 .* 5353 cisco ISR44[0-9][0-9][^0-9]CT5760crypto isakmp fragmentationASR90(2|3|7) Softwareno ip nat service pptpipv6\s+enable\s*cisco\s+ASRcrypto gdoi[Xx]86_64snmp-server view restrict ciscoProcessMIB excludedtransport-map type persistent webuiMember Interfacesis in server modevpdn enable(CCSIP_UDP_SOCKET|CCSIP_TCP_SOCKET)ipv6 dhcp relaysnmp-server community mycommunity view restrict ROsrtp-authxconnecttunnel mode ethernet gre ipv(4|6)CCSIP_Catalyst 4500 L3 SwitchCCH323_C3850(ASR1000-ESP100|ASR1002-X)17\(?.+ .* 5353 interface BDIWhitelist\s+bootflash:whitelist\.txt5700 Series Wireless LANipv6 dhcp servermetadata flowno autonomicCatalyst 365[0-9][^0-9]+L3 Switchsbc tunnel protection ipsecSupervisor 8Type\s+Autonomic Registrar17[^0-9].*\s(500|4500|848|4848)\stcp adjust-mssip address dhcpASR1000-ESP(40|100)ip helper addresscisco cBRcisco ASR-?92[0-9][^0-9]Catalyst L3 Switchip nat (inside|outside|enable)ipv6 snooping6 .+ listenmpls traffic-eng tunnelsip sla respondercrypto map[Aa]ddressesip rsvp bandwidthautonomic\ +ip helper-addressWS-X45-SUP7L-EUmbrella Configurationsnmp-server view restrict iso included(^|\n)line vty[^\n]*\n\s*(?!transport input)(\b|$)Initiator ProfileOper(ation)? Mode:\s*(Enabled|auto)(^|\n)\s*cluster run\n\s*ip msdp peer(^|\n)\s*(::|[0-9a-fA-F]{1,4}:)(^|\n)\s*17\b[^\n]*\s(500|4500)\b(^|\n)\s*cmp\s(^|\n)\s*OSPFv3(^|\n)\s*internal_service\s+CDP enabledNot a management cluster member(^|\n)\s*17\b[^\n]*\s(500|4500)\bBGP(?! not active)1899918999Subrate T3/E3aaa[^\n]group tacacs\n\s+authentication violation\s+(protect|replace|restrict)LISTENOper(ation)? Mode:area \S+ virtual-link \S+ (encryption|authentication) ipsec spiRole:\s*Client\s*\(SmartInstall disabled\)Role:\s*Client\s*\(SmartInstall enabled\)Sending CDP(^|\n)line vty[^\n]*\n\s*transport input[^\n]* (all|telnet)\n\s+ip ospfpsecure-violation\s+Enabledno ip nat serviceRole:\s*Client\n\s*dial-peer\s+voice\s+ospfv3 (encryption|authentication) ipsec\n\s*ip dhcp relay information optionbpduguard\s+Enabled\n\s+crypto mapVTP Domain Name\s*:[ \t]*\narea \S+ (encryption|authentication) ipsec\n\s*aaa authentication login\n\s+ip ospf message-digest17\b[^\n]+\b(500|4500)\b\n\s*ip dhcp relay information policy.+encapsulateSmart Licensing\s+is\s+[Ee][Nn][Aa][Bb][Ll][Ee][Dd]\n\s+tunnel protection ipsec profile17\b[^\n]+\b(500|848|4500)\b\n\s*spanning-tree\s+portfast\s+bpduguard\s+default17\b[^\n]+\b(500|848|4500)\b\n\s+ntp\s+multicastsecurity-violation\s+Enabled\n\s*(ip|cable) helper-addresscluster commander \n\s+authentication port-controlSM-X-1T3/E3\n\s*ip http (secure-)?server\n\s+spanning-tree\s+bpduguard\s+enable \n\s+switchport voice vlanShutdown Vlanipv6 ospf (encryption|authentication)VTP Operating Mode\s*:\s*Server^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*6\.0*4\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*8\.0*1\.?e$^0*16\.0*9\.0*1\.?b$^0*16\.0*9\.0*1\.?d$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*16\.0*10\.0*1$^0*16\.0*11\.0*1$^0*16\.0*12\.0*1$^0*16\.0*13\.0*1$^0*16\.0*14\.0*1$^0*16\.0*15\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*3\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*7\.0*1$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*9\.0*1\.?b$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*18\.0*4\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*13\.0*8\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*7\.0*1\.?b$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*13\.0*8\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*3\.0*7$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*9\.0*1\.?b$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*9\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?E$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*6\.0*3$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*7\.0*2$^0*16\.0*7\.0*3$^0*16\.0*8\.0*1$^0*16\.0*8\.0*1\.?a$^0*16\.0*8\.0*1\.?b$^0*16\.0*8\.0*1\.?c$^0*16\.0*8\.0*1\.?d$^0*16\.0*8\.0*2$^0*16\.0*9\.0*1\.?b$^0*16\.0*9\.0*1\.?c$^0*16\.0*9\.0*1\.?s$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*6\.0*3$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*8\.0*1$^0*16\.0*8\.0*1\.?a$^0*16\.0*8\.0*1\.?b$^0*16\.0*8\.0*1\.?c$^0*16\.0*8\.0*1\.?s$^0*16\.0*9\.0*1\.?b$^0*16\.0*9\.0*1\.?c$^0*16\.0*9\.0*1\.?d$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*10\.0*1\.?E$^0*3\.0*10\.0*1\.?a\.?E$^0*3\.0*10\.0*1\.?s\.?E$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*16\.0*7\.?S$^0*3\.0*16\.0*7\.?a\.?S$^0*3\.0*16\.0*7\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*18\.0*4\.?S\.?P$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*8\.0*6\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*3\.0*7$^0*16\.0*3\.0*8$^0*16\.0*7\.0*1\.?b$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*3\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*1\.?a\.?E$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*9\.0*0\.?E$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*9\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*10\.0*1\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*6\.0*8\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*3\.0*7$^0*16\.0*3\.0*8$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*1\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*01\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*16\.0*0\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*16\.0*12\.0*1$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*7\.0*1\.?b$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*5\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*6\.0*3$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*8\.0*1$^0*16\.0*8\.0*1\.?s$^0*16\.0*9\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*13\.0*8\.?S$^0*3\.0*13\.0*9\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*16\.0*7\.?S$^0*3\.0*16\.0*7\.?a\.?S$^0*3\.0*16\.0*7\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*6\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*9\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*6\.0*1$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*3\.0*1$^0*16\.0*4\.0*1$^0*3\.0*10\.0*01\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*0\.?x\.?a\.?S$^0*3\.0*7\.0*0\.?x\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?E$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?c\.?E$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*13\.0*8\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*6\.0*7\.?a\.?E$^0*3\.0*6\.0*7\.?b\.?E$^0*3\.0*6\.0*8\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*8\.0*5\.?E$^0*3\.0*8\.0*5\.?a\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?S$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*2\.0*1$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*6\.0*7\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*6\.0*3$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*9\.0*1\.?b$^0*16\.0*12\.0*1$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*11\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*4\.0*8\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*\.0*0$^0*\.0*1$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*9\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?E$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*13\.0*8\.?S$^0*3\.0*13\.0*9\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*7\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*5\.?S\.?Q$^0*3\.0*5\.0*6\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*11\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*16\.0*11\.0*1$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*10\.0*01\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*0\.?x\.?a\.?S$^0*3\.0*7\.0*0\.?x\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?S\.?Q$^0*3\.0*5\.0*4\.?S\.?Q$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*9\.0*1\.?b$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*16\.0*0\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S\.?Q$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S\.?Q$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*9\.0*1\.?b$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*16\.0*6\.?S$^0*3\.0*16\.0*6\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*17\.0*4\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*18\.0*3\.?S\.?P$^0*3\.0*18\.0*3\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*18\.0*4\.?S$^0*3\.0*18\.0*4\.?S\.?P$^0*3\.0*18\.0*6\.?S\.?P$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*1\.0*0\.?S\.?G$^0*3\.0*1\.0*1\.?S\.?G$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*6\.?S\.?G$^0*3\.0*4\.0*7\.?S$^0*3\.0*4\.0*7\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?S$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*6\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*2\.0*0\.?X\.?O$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*2\.?S\.?G$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*5\.0*8\.?S\.?Q$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*2\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*0\.?a\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*2\.0*1\.0*0$^0*2\.0*1\.0*1$^0*2\.0*1\.0*2$^0*2\.0*2\.0*1$^0*2\.0*2\.0*2$^0*2\.0*2\.0*3$^0*2\.0*3\.0*0$^0*2\.0*3\.0*0\.?t$^0*2\.0*3\.0*1\.?t$^0*2\.0*3\.0*2$^0*2\.0*4\.0*0$^0*2\.0*4\.0*1$^0*2\.0*5\.0*0$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*2\.0*0\.?J\.?A$^0*3\.0*2\.0*0\.?S\.?E$^0*3\.0*2\.0*0\.?S\.?G$^0*3\.0*2\.0*10\.?S\.?G$^0*3\.0*2\.0*1\.?S\.?E$^0*3\.0*2\.0*1\.?S\.?G$^0*3\.0*2\.0*2\.?S\.?E$^0*3\.0*2\.0*2\.?S\.?G$^0*3\.0*2\.0*3\.?S\.?E$^0*3\.0*2\.0*3\.?S\.?G$^0*3\.0*2\.0*4\.?S\.?G$^0*3\.0*2\.0*5\.?S\.?G$^0*3\.0*2\.0*6\.?S\.?G$^0*3\.0*2\.0*7\.?S\.?G$^0*3\.0*2\.0*8\.?S\.?G$^0*3\.0*2\.0*9\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?E$^0*3\.0*3\.0*0\.?S\.?G$^0*3\.0*3\.0*0\.?S\.?Q$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?S\.?E$^0*3\.0*3\.0*1\.?S\.?G$^0*3\.0*3\.0*1\.?S\.?Q$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?S\.?E$^0*3\.0*3\.0*2\.?S\.?G$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*3\.0*3\.?S\.?E$^0*3\.0*3\.0*4\.?S\.?E$^0*3\.0*3\.0*5\.?S\.?E$^0*3\.0*4\.0*0\.?S\.?G$^0*3\.0*4\.0*0\.?S\.?Q$^0*3\.0*4\.0*1\.?S\.?G$^0*3\.0*4\.0*1\.?S\.?Q$^0*3\.0*4\.0*2\.?S\.?G$^0*3\.0*4\.0*3\.?S\.?G$^0*3\.0*4\.0*4\.?S\.?G$^0*3\.0*4\.0*5\.?S\.?G$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*0\.?S\.?Q$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*4\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*1\.?x\.?b\.?S$^0*3\.0*10\.0*1\.?x\.?c\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*3\.0*0\.?X\.?O$^0*3\.0*3\.0*1\.?X\.?O$^0*3\.0*3\.0*2\.?X\.?O$^0*3\.0*5\.0*0\.?E$^0*3\.0*5\.0*1\.?E$^0*3\.0*5\.0*2\.?E$^0*3\.0*5\.0*3\.?E$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?E$^0*3\.0*6\.0*0\.?a\.?E$^0*3\.0*6\.0*0\.?b\.?E$^0*3\.0*6\.0*1\.?E$^0*3\.0*6\.0*2\.?E$^0*3\.0*6\.0*2\.?a\.?E$^0*3\.0*6\.0*3\.?E$^0*3\.0*6\.0*4\.?E$^0*3\.0*6\.0*5\.?E$^0*3\.0*6\.0*5\.?a\.?E$^0*3\.0*6\.0*5\.?b\.?E$^0*3\.0*6\.0*6\.?E$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*1\.?a\.?S$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?E$^0*3\.0*7\.0*5\.?S$^0*3\.0*7\.0*6\.?S$^0*3\.0*7\.0*7\.?S$^0*3\.0*7\.0*8\.?S$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*2\.?S$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*0\.?x\.?a\.?S$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*1\.?a\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*12\.0*1$^0*16\.0*7\.0*1\.?b$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*18\.0*3\.?b\.?S\.?P$^0*3\.0*4\.0*0\.?S$^0*3\.0*4\.0*0\.?a\.?S$^0*3\.0*4\.0*1\.?S$^0*3\.0*4\.0*2\.?S$^0*3\.0*4\.0*3\.?S$^0*3\.0*4\.0*4\.?S$^0*3\.0*4\.0*5\.?S$^0*3\.0*4\.0*6\.?S$^0*3\.0*4\.0*7\.?S$^0*3\.0*5\.0*0\.?S$^0*3\.0*5\.0*1\.?S$^0*3\.0*5\.0*2\.?S$^0*3\.0*5\.0*8\.?S\.?Q$^0*3\.0*6\.0*0\.?S$^0*3\.0*6\.0*1\.?S$^0*3\.0*6\.0*2\.?S$^0*3\.0*7\.0*0\.?S$^0*3\.0*7\.0*0\.?b\.?S$^0*3\.0*7\.0*1\.?S$^0*3\.0*7\.0*2\.?S$^0*3\.0*7\.0*2\.?t\.?S$^0*3\.0*7\.0*3\.?S$^0*3\.0*7\.0*4\.?S$^0*3\.0*7\.0*4\.?a\.?S$^0*3\.0*7\.0*5\.?S$^0*3\.0*8\.0*0\.?S$^0*3\.0*8\.0*1\.?S$^0*3\.0*8\.0*2\.?S$^0*3\.0*9\.0*0\.?S$^0*3\.0*9\.0*0\.?a\.?S$^0*3\.0*9\.0*1\.?S$^0*3\.0*9\.0*2\.?S$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*3\.0*10\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*0\.?a\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*2\.?a\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$^0*3\.0*13\.0*5\.?S$^0*3\.0*13\.0*5\.?a\.?S$^0*3\.0*13\.0*6\.?S$^0*3\.0*13\.0*6\.?a\.?S$^0*3\.0*13\.0*6\.?b\.?S$^0*3\.0*13\.0*7\.?S$^0*3\.0*13\.0*7\.?a\.?S$^0*3\.0*14\.0*0\.?S$^0*3\.0*14\.0*1\.?S$^0*3\.0*14\.0*2\.?S$^0*3\.0*14\.0*3\.?S$^0*3\.0*14\.0*4\.?S$^0*3\.0*15\.0*0\.?S$^0*3\.0*15\.0*1\.?S$^0*3\.0*15\.0*1\.?c\.?S$^0*3\.0*15\.0*1\.?x\.?b\.?S$^0*3\.0*15\.0*2\.?S$^0*3\.0*15\.0*2\.?x\.?b\.?S$^0*3\.0*15\.0*3\.?S$^0*3\.0*15\.0*4\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*16\.0*0\.?a\.?S$^0*3\.0*16\.0*0\.?b\.?S$^0*3\.0*16\.0*0\.?c\.?S$^0*3\.0*16\.0*1\.?S$^0*3\.0*16\.0*1\.?a\.?S$^0*3\.0*16\.0*2\.?S$^0*3\.0*16\.0*2\.?a\.?S$^0*3\.0*16\.0*2\.?b\.?S$^0*3\.0*16\.0*3\.?S$^0*3\.0*16\.0*3\.?a\.?S$^0*3\.0*16\.0*4\.?S$^0*3\.0*16\.0*4\.?a\.?S$^0*3\.0*16\.0*4\.?b\.?S$^0*3\.0*16\.0*4\.?c\.?S$^0*3\.0*16\.0*4\.?d\.?S$^0*3\.0*16\.0*4\.?e\.?S$^0*3\.0*16\.0*4\.?g\.?S$^0*3\.0*16\.0*5\.?S$^0*3\.0*16\.0*5\.?a\.?S$^0*3\.0*16\.0*5\.?b\.?S$^0*3\.0*17\.0*0\.?S$^0*3\.0*17\.0*1\.?S$^0*3\.0*17\.0*1\.?a\.?S$^0*3\.0*17\.0*2\.?S$^0*3\.0*17\.0*3\.?S$^0*3\.0*18\.0*0\.?S$^0*3\.0*18\.0*0\.?S\.?P$^0*3\.0*18\.0*0\.?a\.?S$^0*3\.0*18\.0*1\.?S$^0*3\.0*18\.0*1\.?S\.?P$^0*3\.0*18\.0*1\.?a\.?S\.?P$^0*3\.0*18\.0*1\.?b\.?S\.?P$^0*3\.0*18\.0*1\.?c\.?S\.?P$^0*3\.0*18\.0*1\.?g\.?S\.?P$^0*3\.0*18\.0*1\.?h\.?S\.?P$^0*3\.0*18\.0*1\.?i\.?S\.?P$^0*3\.0*18\.0*2\.?S$^0*3\.0*18\.0*2\.?S\.?P$^0*3\.0*18\.0*2\.?a\.?S\.?P$^0*3\.0*18\.0*3\.?S$^0*3\.0*7\.0*0\.?E$^0*3\.0*7\.0*1\.?E$^0*3\.0*7\.0*2\.?E$^0*3\.0*7\.0*3\.?E$^0*3\.0*7\.0*4\.?E$^0*3\.0*7\.0*5\.?E$^0*3\.0*8\.0*0\.?E$^0*3\.0*8\.0*1\.?E$^0*3\.0*8\.0*2\.?E$^0*3\.0*8\.0*3\.?E$^0*3\.0*8\.0*4\.?E$^0*3\.0*9\.0*0\.?E$^0*3\.0*9\.0*1\.?E$^0*3\.0*9\.0*2\.?E$^0*3\.0*9\.0*2\.?b\.?E$^0*16\.0*7\.0*1$^0*16\.0*7\.0*1\.?a$^0*16\.0*7\.0*1\.?b$^0*16\.0*8\.0*1$^0*16\.0*8\.0*1\.?a$^0*16\.0*8\.0*1\.?b$^0*16\.0*1\.0*1$^0*16\.0*1\.0*2$^0*16\.0*1\.0*3$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*5\.?b$^0*16\.0*3\.0*6$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?a$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*9\.0*1\.?b$^0*3\.0*2\.0*0\.?J\.?A$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*3\.0*15\.0*0\.?S$^0*3\.0*16\.0*0\.?S$^0*3\.0*17\.0*0\.?S$^0*16\.0*2\.0*1$^0*16\.0*2\.0*2$^0*16\.0*3\.0*1$^0*16\.0*3\.0*1\.?a$^0*16\.0*3\.0*2$^0*16\.0*3\.0*3$^0*16\.0*3\.0*4$^0*16\.0*3\.0*5$^0*16\.0*3\.0*6$^0*16\.0*4\.0*1$^0*16\.0*4\.0*2$^0*16\.0*4\.0*3$^0*16\.0*5\.0*1$^0*16\.0*5\.0*1\.?b$^0*16\.0*5\.0*2$^0*16\.0*5\.0*3$^0*16\.0*6\.0*1$^0*16\.0*6\.0*2$^0*16\.0*6\.0*3$^0*16\.0*7\.0*1$^0*16\.0*8\.0*1$^0*16\.0*8\.0*1\.?s$^0*3\.0*10\.0*0\.?S$^0*3\.0*10\.0*10\.?S$^0*3\.0*10\.0*1\.?S$^0*3\.0*10\.0*2\.?S$^0*3\.0*10\.0*2\.?a\.?S$^0*3\.0*10\.0*2\.?t\.?S$^0*3\.0*10\.0*3\.?S$^0*3\.0*10\.0*4\.?S$^0*3\.0*10\.0*5\.?S$^0*3\.0*10\.0*6\.?S$^0*3\.0*10\.0*7\.?S$^0*3\.0*10\.0*8\.?S$^0*3\.0*10\.0*8\.?a\.?S$^0*3\.0*10\.0*9\.?S$^0*3\.0*11\.0*0\.?S$^0*3\.0*11\.0*1\.?S$^0*3\.0*11\.0*2\.?S$^0*3\.0*11\.0*3\.?S$^0*3\.0*11\.0*4\.?S$^0*3\.0*12\.0*0\.?S$^0*3\.0*12\.0*0\.?a\.?S$^0*3\.0*12\.0*1\.?S$^0*3\.0*12\.0*2\.?S$^0*3\.0*12\.0*3\.?S$^0*3\.0*12\.0*4\.?S$^0*3\.0*13\.0*0\.?S$^0*3\.0*13\.0*1\.?S$^0*3\.0*13\.0*2\.?S$^0*3\.0*13\.0*3\.?S$^0*3\.0*13\.0*4\.?S$